com.fasterxml.jackson.core:jackson-core@2.7.1 vulnerabilities

  • latest version

    2.18.1

  • latest non vulnerable version

  • first published

    13 years ago

  • latest version published

    8 days ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the com.fasterxml.jackson.core:jackson-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Denial of Service (DoS)

com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

Affected versions of this package are vulnerable to Denial of Service (DoS) due to missing input size validation when performing numeric type conversions. A remote attacker can exploit this vulnerability by causing the application to deserialize data containing certain numeric types with large values, causing the application to exhaust all available resources.

How to fix Denial of Service (DoS)?

Upgrade com.fasterxml.jackson.core:jackson-core to version 2.15.0-rc1 or higher.

[2.0.0-RC1,2.15.0-rc1)
  • M
Denial of Service (DoS)

com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

Affected versions of this package are vulnerable to Denial of Service (DoS). If the REST endpoint consumes POST requests with JSON or XML data and data are invalid, the first unrecognized token is printed to server.log

If the first token is word of length 10MB, the whole word is printed. This is potentially dangerous and can be used to attack the server by filling the disk with logs.

How to fix Denial of Service (DoS)?

Upgrade com.fasterxml.jackson.core:jackson-core to version 2.8.6 or higher.

[,2.8.6)
  • M
Denial of Service (DoS)

com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

Affected versions of this package are vulnerable to Denial of Service (DoS). When WRITE_BIGDECIMAL_AS_PLAIN setting is enabled, Jackson will attempt to write out the whole number, no matter how large the exponent. The following sample code will trigger an out of memory exception:

ObjectMapper mapper = new ObjectMapper().enable(JsonGenerator.Feature.WRITE_BIGDECIMAL_AS_PLAIN);
mapper.writeValueAsString(new java.math.BigDecimal("9.223372E+1010671858"));

How to fix Denial of Service (DoS)?

Upgrade com.fasterxml.jackson.core:jackson-core to version 2.7.7 or higher.

[2.3.0-rc1,2.7.7)